According to the U.S. Electronic Signatures in Global and National Commerce Act, electronic signature means an electronic sound, symbol or process attached to or logically associated with a contract or other record. and executed or adopted by a person with the intend to sign the record. There are three common reasons for applying a digital signature to communications: Authentication, Intergrity and Non-repudiation. Digital signatures use encryption techniques. The algorithms are not typically suited for direct encryption of bulk plaintexts as there are more efficient methods are available. One of the main differences between a digital signature and a written signature is that the user does not "see" what he signs. The application that presents a hash code has to be encrypted with the private key, but in the case of a malicious application a hash code of another document might be presented so that the users thinks he is signing the document he sees on the screen but is actually unwillingly signing another.
Here are some links for further study:- How Digitaltal Signature works: http://www.youdzone.com/signature.html; What is a Digital Signature: http://en.wikipedia.org/wiki/Digital_signature#Authentication. http://www.flickr.com/photos/54598307@N00/242234002/
DIGITAL SIGNATURE
According to the U.S. Electronic Signatures in Global and National Commerce Act, electronic signature means an electronic sound, symbol or process attached to or logically associated with a contract or other record. and executed or adopted by a person with the intend to sign the record. There are three common reasons for applying a digital signature to communications: Authentication, Intergrity and Non-repudiation. Digital signatures use encryption techniques. The algorithms are not typically suited for direct encryption of bulk plaintexts as there are more efficient methods are available. One of the main differences between a digital signature and a written signature is that the user does not "see" what he signs. The application that presents a hash code has to be encrypted with the private key, but in the case of a malicious application a hash code of another document might be presented so that the users thinks he is signing the document he sees on the screen but is actually unwillingly signing another.Here are some links for further study:- How Digitaltal Signature works: http://www.youdzone.com/signature.html; What is a Digital Signature: http://en.wikipedia.org/wiki/Digital_signature#Authentication.
http://www.flickr.com/photos/54598307@N00/242234002/